CN105426727A - Fingerprint decryption method and mobile terminal - Google Patents

Fingerprint decryption method and mobile terminal Download PDF

Info

Publication number
CN105426727A
CN105426727A CN201510962840.0A CN201510962840A CN105426727A CN 105426727 A CN105426727 A CN 105426727A CN 201510962840 A CN201510962840 A CN 201510962840A CN 105426727 A CN105426727 A CN 105426727A
Authority
CN
China
Prior art keywords
user
finger print
print information
decrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510962840.0A
Other languages
Chinese (zh)
Other versions
CN105426727B (en
Inventor
杨乐
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510962840.0A priority Critical patent/CN105426727B/en
Publication of CN105426727A publication Critical patent/CN105426727A/en
Application granted granted Critical
Publication of CN105426727B publication Critical patent/CN105426727B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The embodiment of the invention provides a fingerprint decryption method which includes the steps that fingerprint information of a first user and/or fingerprint information of a second user are/is received; according to the received fingerprint information of the first user and/or the fingerprint information of the second user, an object to be decrypted is decrypted to obtain user authorities, in different levels, of the object to be decrypted, wherein the object to be decrypted is encrypted through combined information of the preset fingerprint information of the first user and the preset fingerprint information of the second user. The embodiment of the invention further relates to a mobile terminal.

Description

Fingerprint decryption method and mobile terminal
Technical field
The present invention relates to fingerprint identification technology field, particularly relate to a kind of fingerprint decryption method and mobile terminal.
Background technology
Existing mobile terminal, such as the Mobile solution of intelligence energy mobile phone etc. is more and more abundanter, mobile terminal has increasing financial function, such as mobile payment, stored value card etc., store more individual privacy and significant data inside mobile terminal, therefore the security of mobile terminal is had higher requirement.
At present, the method be encrypted the data of mobile terminal is normally at input through keyboard picture and text password or word password, and the true and false of this encryption method None-identified user, and when user uses in public, very easily divulging a secret, security is not enough.
Summary of the invention
In view of this, the fingerprint decryption method being necessary to provide a kind of security higher and mobile terminal,
A kind of fingerprint decryption method, receives the finger print information of first user and/or receives the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
A kind of mobile terminal, comprise: comprise housing, the display screen be arranged on housing, be arranged on the circuit board in housing and be electrically connected storer and the processor of described circuit board, described storer is in order to store executable data, described processor in order to perform the data in described storer, with
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
Compared with prior art, in the fingerprint decryption method in the embodiment of the present invention and mobile terminal, receive the finger print information of first user and/or receive the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user, treat decrypt objects by finger print information to be decrypted, improve security.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment, description below, apparently, accompanying drawing in the following describes is only some embodiments of the embodiment of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic flow sheet of the fingerprint decryption method that Fig. 1 provides for the embodiment of the present invention.
The structural framing schematic diagram of the mobile terminal that Fig. 2 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only embodiment of the present invention part embodiment, instead of whole embodiments.Based on the embodiment in the embodiment of the present invention, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of embodiment of the present invention protection.
Fig. 1 is the schematic flow sheet of the fingerprint decryption method of the embodiment of the present invention.As shown in Figure 1, the method comprises:
S110, the finger print information of reception first user and/or the finger print information of reception the second user;
The finger print information of first user that S120, basis receive and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
In the present embodiment, step S110 can be divided into three kinds of different reception conditions, comprising: the finger print information receiving only first user; Receive only the finger print information of the second user and receive the finger print information of first user and the finger print information of the second user.
In the present embodiment, by the combined information cryptographic object of the finger print information of the finger print information and the second user that pre-set first user, obtain object to be decrypted and store.The embodiment of the present invention can be applied to any occasion needing encrypting and decrypting, and such as mobile terminal unlocks, and account logs in, and pays and switch the mode of operation of mobile terminal, operating system, wallpaper, theme etc.Described object to be decrypted includes but not limited to application program, document, file.
Alternatively, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, and to obtain the user right of the different stage to described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right.
The combined information of the finger print information of described first user and the finger print information of the second user can be the weighted array of the unique point that the Partial Feature point extracted from the finger print information of the some of first user or multiple finger extracts with the finger print information from the some of the second user or multiple finger.Certainly, described combined information also can be the whole unique point from the finger print information of the some of first user or multiple finger and the weighted array of whole unique points of the finger print information from the some of the second user or multiple finger.
In the present embodiment, when the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach default matching condition, decrypt objects will be treated and be decrypted to obtain first user authority.Particularly, if the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2, wherein A, B can be respectively number percent, and K1, K2 are respectively the characteristic point data taking from first user and the characteristic point data taking from the second user.Described number percent can be self-defined.For example, if A is 40%, B is 60%, the matching condition then preset is 40%*K1+60%*K2, and when the finger print information of the first user received reaches 30%K1, namely, when A in the A*K1 of the finger print information of the first user received is more than 1/2nd A, decrypt objects will be treated be decrypted to obtain first user authority, or when the finger print information of the first user received reaches A*K1, just treat decrypt objects and be decrypted to obtain first user authority.
Similarly, matching condition can be arranged to when the finger print information of the second user received reaches 40%K2, namely, when B ultrasonic in the finger print information B*K2 of the second user received crosses 1/2nd B, decrypt objects will be treated be decrypted to obtain the second user right, or when the finger print information of the second user received reaches B*K2, just treat decrypt objects deciphering.
Described first user authority can be arranged to identical with described second user right, and described first user authority and described second user right also can be arranged to difference, and such as, when A is greater than B, described first user authority is greater than described second user right; When A is less than B, described first user authority is less than described second user right.
Alternatively, described first user authority can in order to control described first user authority in order to control described first user with the described object to be decrypted of first user authority access; Or described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.Described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
Alternatively, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, comprise: by the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user; When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right.
Particularly, if the combined information of the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2.So, when A and B meets corresponding condition simultaneously, decrypt objects will be treated and be decrypted to obtain the 3rd user right.Such as, when the finger print information of the first user received reaches A*K1 and reaches B*K2 when the finger print information of the second user received, just treat decrypt objects and be decrypted.Wherein, described 3rd user right is in order to control described first user and described second user accesses object to be decrypted with the 3rd user right.Described 3rd user right can higher than described first user authority and described second user right.Wherein, described 3rd user right is higher than described first user authority and described second user right.
Further, the finger print information of first user when receiving and the finger print information of the second user can also be arranged to, mate with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, just treat decrypt objects to be decrypted, to obtain the 3rd user right.
Alternatively, receive the finger print information of described first user and receive the finger print information of described second user, comprising: the finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.Such as, be greater than the first predetermined threshold value T.T. when input first user finger print information and the second user fingerprints information, be judged to be that the fingerprint inputted does not belong to once inputting.Such as, input was more than 3 seconds, and the fingerprint of the input thought after 3 seconds does not belong to the fingerprint content of this deciphering input.
Alternatively, receive the finger print information of described first user and receive the finger print information of described second user, comprising: the time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.When adjacent twice fingerprint input interval greater than the second predetermined threshold value time, judge that the finger print information of first user and the finger print information of the second user of input do not belong to once inputting, or when judging to decipher, the finger print information of first user of input is different from the fingerprint combined information preset with the finger print information of the second user.
Alternatively, receive the finger print information of first user and receive the finger print information of the second user, comprise: accept the finger print information of first user simultaneously and accept the finger print information of the second user, otherwise, be judged to not belong to once inputting, or the finger print information of first user inputted when judging deciphering is different from the fingerprint combined information preset with the finger print information of the second user.
In fingerprint decryption method in the embodiment of the present invention, receive the finger print information of first user and/or receive the finger print information of the second user; Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user, treat decrypt objects by finger print information to be decrypted, improve security.
Refer to Fig. 2, Fig. 2 is the structural representation of the mobile terminal 200 in the embodiment of the present invention.Described mobile terminal 200, comprise housing 210, be arranged on the display screen 220 on housing 210, connect the circuit board 230 of display screen 220 and be electrically connected storer 240 and the processor 250 of described circuit board 230, described storer 240 for storing instruction, described processor 250 in order to perform instruction in described storer 240 with:
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
Described mobile terminal 200 can be the electronic equipment that mobile phone, panel computer, personal digital assistant etc. possess communication function.Described housing 210 can be the combination of plastic housing, betal can or plastic housing and betal can, and the material of described housing 210 is not construed as limiting in the present invention.
Described display screen 220 can be light emitting diode (LED) display screen or organic light-emitting diode (OLED) display screen.Described display screen 220 can in order to the interface of display application program.
Described storer 240 in order to deposit executable data, program or instruction, to realize man-machine interaction.Described processor 250 is in order to perform described executable program.Storer 240 can comprise ROM (read-only memory) and random access memory, and provides instruction and data to processor 250.A part for storer 250 can also comprise non-volatile row random access memory (NVRAM).Described processor 250 can also be called CPU (CentralProcessingUnit, CPU (central processing unit)).
In the present embodiment, the finger print information of described reception first user and/or the finger print information of reception the second user, can be divided into the reception condition that three kinds different, comprise: the finger print information receiving only first user; Receive only the finger print information of the second user and receive the finger print information of first user and the finger print information of the second user.
In the present embodiment, described processor 250 performs described data with the combined information cryptographic object of the finger print information of the finger print information by pre-setting first user and the second user, obtains object to be decrypted and stores.The embodiment of the present invention can be applied to any occasion needing encrypting and decrypting, and such as mobile terminal unlocks, and account logs in, and pays and switch the mode of operation of mobile terminal, operating system, wallpaper, theme etc.Described object to be decrypted includes but not limited to application program, document, file.
Alternatively, described processor 250 performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right of the different stage to described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right.
The combined information of the finger print information of described first user and the finger print information of the second user can be the weighted array of the unique point that the Partial Feature point extracted from the finger print information of the some of first user or multiple finger extracts with the finger print information from the some of the second user or multiple finger.Certainly, described combined information also can be the whole unique point from the finger print information of the some of first user or multiple finger and the weighted array of whole unique points of the finger print information from the some of the second user or multiple finger.
In the present embodiment, described processor 250 performs described data with when the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach default matching condition, will treat decrypt objects and be decrypted to obtain first user authority.Particularly, if the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2, wherein A, B can be respectively number percent, and K1, K2 are respectively the characteristic point data taking from first user and the characteristic point data taking from the second user.Described number percent can be self-defined.For example, if A is 40%, B is 60%, the matching condition then preset is 40%*K1+60%*K2, and when the finger print information of the first user received reaches 30%K1, namely, when A in the A*K1 of the finger print information of the first user received is more than 1/2nd A, decrypt objects will be treated be decrypted to obtain first user authority, or when the finger print information of the first user received reaches A*K1, just treat decrypt objects and be decrypted to obtain first user authority.
Similarly, matching condition can be arranged to when the finger print information of the second user received reaches 40%K2 by described processor 250, namely, when B ultrasonic in the finger print information B*K2 of the second user received crosses 1/2nd B, decrypt objects will be treated be decrypted to obtain the second user right, or when the finger print information of the second user received reaches B*K2, just treat decrypt objects deciphering.
Described first user authority can be arranged to identical with described second user right, and described first user authority and described second user right also can be arranged to difference, and such as, when A is greater than B, described first user authority is greater than described second user right; When A is less than B, described first user authority is less than described second user right.
Alternatively, described first user authority can in order to control described first user authority in order to control described first user with the described object to be decrypted of first user authority access; Or described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.Described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
Alternatively, described processor 250 performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right to the different stage of described object to be decrypted, comprise: by the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user; When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right.
Particularly, if the combined information of the combined information of the finger print information of the finger print information of described first user and described second user is expressed as: A*K1+B*K2.So, when A and B meets corresponding condition simultaneously, decrypt objects will be treated and be decrypted to obtain the 3rd user right.Such as, when the finger print information of the first user received reaches A*K1 and reaches B*K2 when the finger print information of the second user received, just treat decrypt objects and be decrypted.Wherein, described 3rd user right is in order to control described first user and described second user accesses object to be decrypted with the 3rd user right.Described 3rd user right can higher than described first user authority and described second user right.Wherein, described 3rd user right is higher than described first user authority and described second user right.
Further, described processor 250 performs described data to be set to when the finger print information of first user that receive and the finger print information of the second user, mate with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, just treat decrypt objects to be decrypted, to obtain the 3rd user right.
Alternatively, described processor 250 performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising: the finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.Such as, be greater than the first predetermined threshold value T.T. when input first user finger print information and the second user fingerprints information, be judged to be that the fingerprint inputted does not belong to once inputting.Such as, input was more than 3 seconds, and the fingerprint of the input thought after 3 seconds does not belong to the fingerprint content of this deciphering input.
Alternatively, described processor 250 performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising: the time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.When adjacent twice fingerprint input interval greater than the second predetermined threshold value time, judge that the finger print information of first user and the finger print information of the second user of input do not belong to once inputting, or when judging to decipher, the finger print information of first user of input is different from the fingerprint combined information preset with the finger print information of the second user.
Alternatively, described processor 250 performs described data to receive the finger print information of first user and to receive the finger print information of the second user, comprise: accept the finger print information of first user simultaneously and accept the finger print information of the second user, otherwise, be judged to not belong to once inputting, or the finger print information of first user inputted when judging deciphering is different from the fingerprint combined information preset with the finger print information of the second user.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (18)

1. a fingerprint decryption method, comprising:
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
2. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of described first user and receives the finger print information of described second user, comprising:
The finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.
3. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of described first user and receives the finger print information of described second user, comprising:
The time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.
4. fingerprint decryption method as claimed in claim 1, is characterized in that, receives the finger print information of first user and receives the finger print information of the second user, comprising:
Accept the finger print information of first user simultaneously and accept the finger print information of the second user.
5. the fingerprint decryption method as described in claim 1-4 any one, it is characterized in that, the finger print information of the first user that described basis receives and/or the finger print information of the second user are treated decrypt objects and are decrypted, to obtain the user right to the different stage of described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right; Or
By the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user;
When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, wherein, described 3rd user right is higher than described first user authority and described second user right.
6. fingerprint decryption method as claimed in claim 5, it is characterized in that, when the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, comprising:
When the finger print information of the first user received and the finger print information of the second user, match with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, treat unlocking objects to be decrypted, to obtain the 3rd user right.
7. fingerprint decryption method as claimed in claim 5, is characterized in that, described first user authority is in order to control described first user with the described object to be decrypted of first user authority access; Or
Described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.
8. fingerprint decryption method as claimed in claim 5, is characterized in that, described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or
Described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
9. as the fingerprint decryption method in claim 5-8 as described in any one, it is characterized in that, described first user authority is identical with described second user right, or described first user authority is different from described second user right.
10. a mobile terminal, comprise housing, the display screen be arranged on housing, be arranged on the circuit board in housing and be electrically connected storer and the processor of described circuit board, described storer in order to store executable data, described processor in order to perform the data in described storer, with
Receive the finger print information of first user and/or receive the finger print information of the second user;
Treat decrypt objects according to the finger print information of the first user received and/or the finger print information of the second user to be decrypted, to obtain the user right to the different stage of described object to be decrypted, wherein, described object to be decrypted is encrypted by the combined information of the finger print information of the first user pre-set and the finger print information of the second user.
11. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising:
The finger print information receiving described first user is less than or equal to the first predetermined threshold value T.T. with the finger print information receiving the second user.
12. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of described first user and to receive the finger print information of described second user, comprising:
The time interval received between the finger print information of described first user and the finger print information receiving the second user is less than or equal to the second predetermined threshold value.
13. mobile terminals as claimed in claim 10, is characterized in that, described processor performs described data to receive the finger print information of first user and to receive the finger print information of the second user, comprising:
Accept the finger print information of first user simultaneously and accept the finger print information of the second user.
14. mobile terminals as described in claim 11-13 any one, it is characterized in that, described processor performs described data and is decrypted to treat decrypt objects according to the finger print information of first user received and/or the finger print information of the second user, to obtain the user right to the different stage of described object to be decrypted, comprising:
The combined information of the finger print information of the first user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the first user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain first user authority; Or
The combined information of the finger print information of the second user received and the finger print information of the described first user pre-set and the finger print information of the second user is compared;
When the finger print information of the second user received and the combined information of the finger print information of the described first user pre-set and the finger print information of the second user reach matching condition, treat decrypt objects and be decrypted to obtain the second user right; Or
By the finger print information of first user of reception and the finger print information of the second user, compare with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user;
When the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition, treat decrypt objects to be decrypted, to obtain the 3rd user right, wherein, described 3rd user right is higher than described first user authority and described second user right.
15. mobile terminals as claimed in claim 14, it is characterized in that, described processor is provided with when the combined information of the finger print information of the first user received and the finger print information of the finger print information of the second user and the described first user pre-set and the finger print information of the second user reaches matching condition described in performing, treat decrypt objects to be decrypted, to obtain the 3rd user right, comprising:
When the finger print information of the first user received and the finger print information of the second user, match with the combined information of the finger print information of the described first user pre-set and the finger print information of the second user and sequence consensus time, treat unlocking objects to be decrypted, to obtain the 3rd user right.
16. mobile terminals as claimed in claim 14, is characterized in that, described first user authority is in order to control described first user with the described object to be decrypted of first user authority access; Or
Described first user authority is in order to control described second user with the described object to be decrypted of first user authority access.
17. mobile terminals as claimed in claim 14, is characterized in that, described second user right is in order to control the second described user with the described object to be decrypted of described second user right access; Or
Described second user right is in order to control described first user with the described object to be decrypted of described second user right access.
18. mobile terminals as described in claim 10-17 any one, it is characterized in that, described first user authority is identical with described second user right, or described first user authority is different from described second user right.
CN201510962840.0A 2015-12-17 2015-12-17 Fingerprint decryption method and mobile terminal Expired - Fee Related CN105426727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510962840.0A CN105426727B (en) 2015-12-17 2015-12-17 Fingerprint decryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510962840.0A CN105426727B (en) 2015-12-17 2015-12-17 Fingerprint decryption method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105426727A true CN105426727A (en) 2016-03-23
CN105426727B CN105426727B (en) 2019-02-05

Family

ID=55504932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510962840.0A Expired - Fee Related CN105426727B (en) 2015-12-17 2015-12-17 Fingerprint decryption method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105426727B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN107454251A (en) * 2017-07-13 2017-12-08 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN110276206A (en) * 2019-06-10 2019-09-24 Oppo广东移动通信有限公司 The inspection method of encrypted content and check system
CN110990849A (en) * 2019-11-20 2020-04-10 维沃移动通信有限公司 Encryption and decryption method for private data and terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1985260A (en) * 2005-08-04 2007-06-20 株式会社知识潮 Computer controlling method and system by externally connected device
CN102576399A (en) * 2009-10-20 2012-07-11 微软公司 Resource access based on multiple credentials
CN202662026U (en) * 2012-06-05 2013-01-09 上海锦江电子技术工程有限公司 Multi-face recognition system
CN104036177A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Intelligent terminal fingerprint unlocking device and method
CN104331653A (en) * 2014-10-20 2015-02-04 深圳市汇顶科技股份有限公司 Fingerprint decryption method and fingerprint decryption device
CN104537290A (en) * 2014-12-18 2015-04-22 无敌科技(西安)有限公司 Password system and achievement method based on multi-fingerprint identification
US20150137938A1 (en) * 2013-11-15 2015-05-21 Motorola Mobility Llc Method and Apparatus for Authenticating Access to a Multi-Level Secure Environment of an Electronic Device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1985260A (en) * 2005-08-04 2007-06-20 株式会社知识潮 Computer controlling method and system by externally connected device
CN102576399A (en) * 2009-10-20 2012-07-11 微软公司 Resource access based on multiple credentials
CN202662026U (en) * 2012-06-05 2013-01-09 上海锦江电子技术工程有限公司 Multi-face recognition system
US20150137938A1 (en) * 2013-11-15 2015-05-21 Motorola Mobility Llc Method and Apparatus for Authenticating Access to a Multi-Level Secure Environment of an Electronic Device
CN104036177A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Intelligent terminal fingerprint unlocking device and method
CN104331653A (en) * 2014-10-20 2015-02-04 深圳市汇顶科技股份有限公司 Fingerprint decryption method and fingerprint decryption device
CN104537290A (en) * 2014-12-18 2015-04-22 无敌科技(西安)有限公司 Password system and achievement method based on multi-fingerprint identification

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106127004B (en) * 2016-06-21 2019-04-05 Oppo广东移动通信有限公司 A kind of document handling method and terminal device
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN107454251A (en) * 2017-07-13 2017-12-08 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107454251B (en) * 2017-07-13 2020-06-05 Oppo广东移动通信有限公司 Unlocking control method and related product
CN110276206A (en) * 2019-06-10 2019-09-24 Oppo广东移动通信有限公司 The inspection method of encrypted content and check system
CN110276206B (en) * 2019-06-10 2021-03-23 Oppo广东移动通信有限公司 Viewing method and viewing system for encrypted content
CN110990849A (en) * 2019-11-20 2020-04-10 维沃移动通信有限公司 Encryption and decryption method for private data and terminal

Also Published As

Publication number Publication date
CN105426727B (en) 2019-02-05

Similar Documents

Publication Publication Date Title
US10565357B2 (en) Method for securely transmitting a secret data to a user of a terminal
Sabzevar et al. Universal multi-factor authentication using graphical passwords
US10146983B2 (en) Fingerprint decryption method and device
CN100383693C (en) Method of confirming a secure key exchange
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN105426727A (en) Fingerprint decryption method and mobile terminal
US20100313028A1 (en) Electronic Signature Method and Electronic Signature Tool
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
CN102419805A (en) Terminal equipment and method for encrypting user information
CN104978512A (en) Password input and confirmation method and system thereof
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN101695066A (en) Security authentication method and information security authentication equipment
CN103401771A (en) Network isolation method and network isolation system
CN105933503B (en) Information processing method and electronic equipment
US20190258829A1 (en) Securely performing a sensitive operation using a non-secure terminal
CN104915583A (en) Interface decryption processing method and mobile terminal
CN106797381B (en) Communication adapter for user authentication
CN105450402A (en) Method, device and system for inputting combined-type image verification code
KR101392537B1 (en) User memory method using plural one time password
KR102375973B1 (en) Security server using case based reasoning engine and storage medium for installing security function
EP3319000A1 (en) Method for securing a transaction performed from a non-secure terminal
EP3319067A1 (en) Method for authenticating a user by means of a non-secure terminal
EP3319001A1 (en) Method for securely transmitting a secret data to a user of a terminal
EP3319068A1 (en) Method for securely transmitting a secret data to a user of a terminal
KR20090013616A (en) Server certification system and method using server certification code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190205